Microsoft at NICE Conference: Resetting expectations and enabling diversity in the cybersecurity workforce

Credit to Author: Tina Romeo| Date: Tue, 27 Jun 2023 16:00:00 +0000

With the skills gap in cybersecurity professionals, Microsoft is helping attract new generations of diversified talent to the field, including leading discussions at the 2023 NICE Conference.

The post Microsoft at NICE Conference: Resetting expectations and enabling diversity in the cybersecurity workforce appeared first on Microsoft Security Blog.

Read more

Why endpoint management is key to securing an AI-powered future

Credit to Author: Steve Dispensa and Archana Devi Sunder Rajan| Date: Mon, 26 Jun 2023 16:00:00 +0000

With the coming wave of AI, this is precisely the time for organizations to prepare for the future. To be properly ready for AI, Zero Trust principles take on new meaning and scope. The right endpoint management strategy can help provide the broadest signal possible and make your organization more secure and productive for years to come.

The post Why endpoint management is key to securing an AI-powered future appeared first on Microsoft Security Blog.

Read more

IoT devices and Linux-based systems targeted by OpenSSH trojan campaign

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 22 Jun 2023 16:00:00 +0000

Microsoft has uncovered an attack leveraging custom and open-source tools to target internet-facing IoT devices and Linux-based systems. The attack involves deploying a patched version of OpenSSH on affected devices to allow root login and the hijack of SSH credentials.

The post IoT devices and Linux-based systems targeted by OpenSSH trojan campaign appeared first on Microsoft Security Blog.

Read more

Cadet Blizzard emerges as a novel and distinct Russian threat actor

Credit to Author: Microsoft Threat Intelligence| Date: Wed, 14 Jun 2023 16:00:00 +0000

Microsoft attributes several campaigns to a distinct Russian state-sponsored threat actor tracked as Cadet Blizzard (DEV-0586), including the WhisperGate destructive attack, Ukrainian website defacements, and the hack-and-leak front “Free Civilian”.

The post Cadet Blizzard emerges as a novel and distinct Russian threat actor appeared first on Microsoft Security Blog.

Read more

Public preview: Improve Win32 app security via app isolation

Credit to Author: David Weston and Sumit Lahiri| Date: Wed, 14 Jun 2023 15:36:51 +0000

The frequency and impact of zero-day vulnerabilities have witnessed a substantial increase over the years. Attackers frequently exploit either unknown or unpatched vulnerabilities. That’s why we are thrilled to announce the preview of Win32 app isolation.

The post Public preview: Improve Win32 app security via app isolation appeared first on Microsoft Security Blog.

Read more

How Microsoft and Sonrai integrate to eliminate attack paths

Credit to Author: Eugene Tcheby and Tally Shea| Date: Tue, 13 Jun 2023 16:00:00 +0000

Cloud development challenges conventional thinking about risk. Sonrai integrates with Microsoft Sentinel to monitor threats across vectors and automate responses by leveraging security orchestration, automation, and response playbooks, and Microsoft Defender for Cloud to provide visibility across the entire digital estate by identifying possible attack paths and remediating vulnerabilities.

The post How Microsoft and Sonrai integrate to eliminate attack paths appeared first on Microsoft Security Blog.

Read more

Detecting and mitigating a multi-stage AiTM phishing and BEC campaign

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 08 Jun 2023 16:00:00 +0000

Microsoft Defender Experts observed a multi-stage adversary-in-the-middle (AiTM) and business email compromise (BEC) attack targeting banking and financial services organizations over two days. This attack originated from a compromised trusted vendor, involved AiTM and BEC attacks across multiple supplier/partner organizations for financial fraud, and did not use a reverse proxy like typical AiTM attacks.

The post Detecting and mitigating a multi-stage AiTM phishing and BEC campaign appeared first on Microsoft Security Blog.

Read more